Android Network Tool Kit – Anti

Mungkin anda yang biasa menggunakan telefon bimbit Android sudah bosan bermain dengan Angry Birds, dan teringin melakukan sesuatu yang lebih menarik. Ok. Jika itu yang anda fikirkan, kini telah ada sebuah app khas untuk melakukan pentest yang dipanggil sebagai Android Network Tool Kit atau Anti.

Anti mempunyai pelbagai tool untuk menggodam yang biasa digunakan di komputer atau laptop, tetapi kali ini kesemua tool seperti itu terdapat pada Anti dan ini bermakna telefon Android anda boleh digunakan untuk tujuan menggodam.

Sila lihat paparan video dari pembangun Anti:

Berikut adalah quote dari laman pembangun:

ZImperium “Anti” LTD is proud to annonce Android Network Toolkit – Anti.
Anti consists of 2 parts: The Anti version itself and extendable plugins. Upcoming updates will add functionality, plugins or vulnerabilities/exploits to Anti

Using Anti is very intuitive – on each run, Anti will map your network, scan for active devices and vulnerabilities, and will display the information accordingly: Green led signals an ‘Active device’, Yellow led signals “Available ports”, and Red led signals “Vulnerability found”. Also, each device will have an icon representing the type of the device. When finished scanning, Anti will produce an automatic report specifying which vulnerabilities you have or bad practices used, and how to fix each one of them.

What is AntiCredit?
AntiCredit is the app to purchase status and credits for Anti usage.
Once you buy Silver, Gold or Platinum(for corporate users and power users), your status is saved forever. You can use MITM,DOS,SPY,REPLACE IMAGES and other features like PASSWORD CRACKER, but you also get N amount of credits, these credits can be used for attacks and reports.

Once Anti has mapped your network, it is time to choose the attack method:

[+] Scan – This will scan the selected target for open ports and vulnerabilities, also allowing the user to select a specific scanning script for a more advanced/targeted scan.

[+] Spy – This will ‘sniff’ images transferred to/from the selected device and display them on your phone in a nice gallery layout. If you choose a network subnet/range as target, then all images transferred on that network – for all connected devices – will be shown. Another feature of the Spy plugin is to sniff URLs (web sites) and non-secured (ie, not HTTPS) username/passwords logins, shown on the bottom drawer.

[+] D.O.S – This will cause a Denial Of Service (D.O.S) for the selected target, ie. it will deny them any further access to the internet until you exit the attack.

[+] Replace images – This will replace all images transferred to/from the target with an Anti logo, thus preventing from attacked used seeing any images on their browsers while the browse the internet, except for a nice looking Anti logo…

[+] M.I.T.M – The Man In The Middle attack (M.I.T.M) is an advanced attack used mainly in combination with other attack. It allows invoking specific filters to manipulate the network data. Users can also add their own mitm filters to create more mitm attacks.

[+] Attack – This will initiate a vulnerability attack using our Cloud service against a specific target. Once executed successfully, it will allow the attack to control the device remotely from your phone.

[+] Report – This will generate a vulnerability report with findings, recommendations and tips on how to fix found vulnerabilities or bad practices used.

Daftar dan muat turun di sini -> zImperium

Arya Putra
Arya Putrahttps://omghackers.com/
A regular tech blogger who have passions for cats. I will not put my trust on anybody who hated them, doesn't matter if they are my friends or family. I have a dream where I am the owner of a Cat Cafe. Help me achieve it by hiring me as your reviewer. For any review inquiries, you can contact me at [email protected]

Artikel Terkini

spot_imgspot_img

Artikel Berkaitan

spot_imgspot_img